default search action
Ken Barker 0001
Person information
- affiliation: University of Calgary, Alberta, Canada
- affiliation (former): University of Manitoba, Winnipeg, Canada
Other persons with the same name
- Ken Barker 0002 — IBM (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [i6]Maryam Majedi, Ken Barker:
The Privacy Policy Permission Model: A Unified View of Privacy Policies. CoRR abs/2403.17414 (2024) - 2023
- [c116]Michael Mireku Kwakye, Ken Barker:
Blockchain-Based Privacy-Preservation Platform for Data Storage and Query Processing. UbiSec 2023: 380-400 - 2021
- [j28]Maryam Majedi, Ken Barker:
The Privacy Policy Permission Model: A Unified View of Privacy Policies. Trans. Data Priv. 14(1): 1-36 (2021) - [c115]Khosro Salmani, Ken Barker:
Don't fool yourself with Forward Privacy, Your queries STILL belong to us! CODASPY 2021: 131-142 - [e2]Ken Barker, Kambiz Ghazinour:
Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings. Lecture Notes in Computer Science 12840, Springer 2021, ISBN 978-3-030-81241-6 [contents] - 2020
- [j27]Khobaib Zaamout, Tom Arjannikov, Ken Barker:
A Social Crowdsourcing Community Case Study: Interaction Patterns, Evolution, and Factors That Affect Them. IEEE Trans. Comput. Soc. Syst. 7(3): 659-671 (2020) - [j26]Khobaib Zaamout, Tom Arjannikov, Ken Barker:
Corrections to "A Social Crowdsourcing Community Case Study: Interaction Patterns, Evolution, and Factors That Affect Them". IEEE Trans. Comput. Soc. Syst. 7(5): 1317 (2020) - [c114]Emmanuel Onu, Michael Mireku Kwakye, Ken Barker:
Contextual Privacy Policy Modeling in IoT. DASC/PiCom/CBDCom/CyberSciTech 2020: 94-102
2010 – 2019
- 2018
- [j25]Khobaib Zaamout, Ken Barker:
Structure of Crowdsourcing Community Networks. IEEE Trans. Comput. Soc. Syst. 5(1): 144-155 (2018) - [c113]Zahra Shakeri Hossein Abad, Oliver Karras, Kurt Schneider, Ken Barker, Mike Bauer:
Task Interruption in Software Development Projects: What Makes some Interruptions More Disruptive than Others? EASE 2018: 122-132 - [c112]Zahra Shakeri Hossein Abad, Mohammad Noaeen, Didar Zowghi, Behrouz H. Far, Ken Barker:
Two Sides of the Same Coin: Software Developers' Perceptions of Task Switching and Task Interruption. EASE 2018: 175-180 - [c111]Khobaib Zaamout, Ken Barker:
Towards Quantifying Behaviour in Social Crowdsourcing Communities. HCOMP 2018: 203-212 - [c110]Zahra Shakeri Hossein Abad, Vincenzo Gervasi, Didar Zowghi, Ken Barker:
ELICA: An Automated Tool for Dynamic Extraction of Requirements Relevant Information. AIRE@RE 2018: 8-14 - [c109]Zahra Shakeri Hossein Abad, Munib Rahman, Abdullah Cheema, Vincenzo Gervasi, Didar Zowghi, Ken Barker:
Dynamic Visual Analytics for Elicitation Meetings with ELICA. RE 2018: 492-493 - [i5]Zahra Shakeri Hossein Abad, Mohammad Noaeen, Didar Zowghi, Behrouz H. Far, Ken Barker:
Two Sides of the Same Coin: Software Developers' Perceptions of Task Switching and Task Interruption. CoRR abs/1805.05504 (2018) - [i4]Zahra Shakeri Hossein Abad, Oliver Karras, Kurt Schneider, Ken Barker, Mike Bauer:
Task Interruption in Software Development Projects: What Makes some Interruptions More Disruptive than Others? CoRR abs/1805.05508 (2018) - [i3]Zahra Shakeri Hossein Abad, Munib Rahman, Abdullah Cheema, Vincenzo Gervasi, Didar Zowghi, Ken Barker:
Dynamic Visual Analytics for Elicitation Meetings with ELICA. CoRR abs/1807.06076 (2018) - [i2]Zahra Shakeri Hossein Abad, Vincenzo Gervasi, Didar Zowghi, Ken Barker:
ELICA: An Automated Tool for Dynamic Extraction of Requirements Relevant Information. CoRR abs/1808.05857 (2018) - 2017
- [c108]Md. Moniruzzaman, Ken Barker:
Inferring Time when People Visit a Location Using Social Network Data. ICMLA 2017: 838-841 - 2016
- [j24]Hessam Zakerzadeh, Charu C. Aggarwal, Ken Barker:
Managing dimensionality in data privacy anonymization. Knowl. Inf. Syst. 49(1): 341-373 (2016) - [c107]Michael Mireku Kwakye, Ken Barker:
Privacy-preservation in the integration and querying of multidimensional data models. PST 2016: 255-263 - 2015
- [c106]Ken Barker:
Privacy Protection or Data Value: Can We Have Both? BDA 2015: 3-20 - [c105]Hessam Zakerzadeh, Charu C. Aggarwal, Ken Barker:
Big Graph Privacy. EDBT/ICDT Workshops 2015: 255-262 - [c104]Hessam Zakerzadeh, Charu C. Aggarwal, Ken Barker:
Privacy-preserving big data publishing. SSDBM 2015: 26:1-26:11 - 2014
- [j23]Mohammad Jafari, Reihaneh Safavi-Naini, Philip W. L. Fong, Ken Barker:
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies. ACM Trans. Inf. Syst. Secur. 17(1): 3:1-3:31 (2014) - [c103]Kambiz Ghazinour, Amir Hossein Razavi, Ken Barker:
A Model for Privacy Compromisation Value. EUSPN/ICTH 2014: 143-152 - [c102]Hessam Zakerzadeh, Charu C. Aggarwal, Ken Barker:
Towards Breaking the Curse of Dimensionality for High-Dimensional Privacy. SDM 2014: 731-739 - [i1]Hessam Zakerzadeh, Charu C. Aggarwal, Ken Barker:
Towards Breaking the Curse of Dimensionality for High-Dimensional Privacy: An Extended Version. CoRR abs/1401.1174 (2014) - 2013
- [c101]Kambiz Ghazinour, Ken Barker:
A privacy preserving model bridging data provider and collector preferences. EDBT/ICDT Workshops 2013: 174-178 - [c100]Dina Said, Jeroen Stil, Russ Taylor, Ken Barker:
Automatic Identification of Hexagonal Pattern Artifacts in Radio Astronomical Surveys. ICDM Workshops 2013: 40-47 - [c99]Md. Moniruzzaman, Ken Barker:
Redeem with privacy (RWP): privacy protecting framework for geo-social commerce. WPES 2013: 189-200 - 2012
- [j22]Amir H. Chinaei, Rosa Karimi Adl, Chenen Liang, Ken Barker:
Decentralised privacy preservation in social networks. Int. J. Bus. Inf. Syst. 9(4): 402-414 (2012) - [c98]Mina Askari, Reihaneh Safavi-Naini, Ken Barker:
An information theoretic privacy and utility measure for data sanitization mechanisms. CODASPY 2012: 283-294 - [c97]Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini:
Privacy Consensus in Anonymization Systems via Game Theory. DBSec 2012: 74-89 - 2011
- [j21]Faith-Michael E. Uzoka, Okure Udo Obot, Ken Barker, Joseph Osuji:
An experimental comparison of fuzzy logic and analytic hierarchy process for medical decision support systems. Comput. Methods Programs Biomed. 103(1): 10-27 (2011) - [c96]George Shi, Ken Barker:
Extraction of geospatial information on the Web for GIS applications. IEEE ICCI*CC 2011: 41-48 - [c95]Mohammad Jafari, Philip W. L. Fong, Reihaneh Safavi-Naini, Ken Barker, Nicholas Paul Sheppard:
Towards defining semantic foundations for purpose-based privacy policies. CODASPY 2011: 213-224 - [c94]Kambiz Ghazinour, Ken Barker:
Capturing P3P semantics using an enforceable lattice-based structure. PAIS 2011: 4 - [c93]George Shi, Ken Barker:
Thematic data extraction from Web for GIS and applications. ICSDM 2011: 273-278 - [c92]Md. Moniruzzaman, Ken Barker:
Delegation of access rights in a privacy preserving access control model. PST 2011: 124-133 - [c91]Dina Said, Lisa Stirling, Peter Federolf, Ken Barker:
Data preprocessing for distance-based unsupervised Intrusion Detection. PST 2011: 181-188 - [c90]Mishtu Banerjee, Rosa Karimi Adl, Leanne Wu, Ken Barker:
Quantifying Privacy Violations. Secure Data Management 2011: 1-17 - 2010
- [j20]Faith-Michael E. Uzoka, Ken Barker:
Expert systems and uncertainty in medical diagnosis: a proposal for fuzzy-ANP hybridisation. Int. J. Medical Eng. Informatics 2(4): 329-342 (2010) - [c89]Ken Barker:
"Valuing" Privacy While Exposing Data Utility. BNCOD 2010: 1-2 - [c88]Paul M. K. Gordon, Ken Barker, Christoph W. Sensen:
Helping Biologists Effectively Build Workflows, without Programming. DILS 2010: 74-89 - [c87]Leanne Wu, Maryam Majedi, Kambiz Ghazinour, Ken Barker:
Analysis of social networking privacy policies. EDBT/ICDT Workshops 2010 - [c86]Paul M. K. Gordon, Ken Barker, Christoph W. Sensen:
Programming-by-Example Meets the Semantic Web: Using Ontologies and Web Services to Close the Semantic Gap. VL/HCC 2010: 133-140 - [p3]Kambiz Ghazinour, Sampson Pun, Maryam Majedi, Amir H. Chinaei, Ken Barker:
Extending SQL to Support Privacy Policies. From Sociology to Computing in Social Networks 2010: 377-393 - [p2]Keivan Kianmehr, Jamal Jida, Allan Chan, Nancy Situ, Kim Wong, Reda Alhajj, Jon G. Rokne, Ken Barker:
Attractive Interface for XML: Convincing Naive Users to Go Online. Soft Computing in XML Data Management 2010: 165-191
2000 – 2009
- 2009
- [j19]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Performance evaluation of different replica placement algorithms. Int. J. Grid Util. Comput. 1(2): 121-133 (2009) - [c85]Sampson Pun, Amir H. Chinaei, Ken Barker:
Twins (1): Extending SQL to Support Corporation Privacy Policies in Social Networks. ASONAM 2009: 306-311 - [c84]Maryam Majedi, Kambiz Ghazinour, Amir H. Chinaei, Ken Barker:
SQL Privacy Model for Social Networks. ASONAM 2009: 369-370 - [c83]Ken Barker, Mina Askari, Mishtu Banerjee, Kambiz Ghazinour, Brenan Mackas, Maryam Majedi, Sampson Pun, Adepele Williams:
A Data Privacy Taxonomy. BNCOD 2009: 42-54 - [c82]Adesola Omotayo, Ken Barker, Moustafa A. Hammad, Lisa Higham, Jalal Kawash:
Answering Multiple-Item Queries in Data Broadcast Systems. BNCOD 2009: 120-132 - [c81]Kambiz Ghazinour, Maryam Majedi, Ken Barker:
A Model for Privacy Policy Visualization. COMPSAC (2) 2009: 335-340 - [c80]Kambiz Ghazinour, Maryam Majedi, Ken Barker:
A Lattice-Based Privacy Aware Access Control Model. CSE (3) 2009: 154-159 - [c79]Sampson Pun, Ken Barker:
Privacy FP-Tree. DASFAA Workshops 2009: 246-260 - [c78]Keivan Kianmehr, X. Peng, Chris Luce, Justin Chung, Nam Pham, Walter Chung, Reda Alhajj, Jon G. Rokne, Ken Barker:
Mining online shopping patterns and communities. iiWAS 2009: 400-404 - [c77]Keivan Kianmehr, Shang Gao, Jawad Attari, M. Mushfiqur Rahman, Kofi Akomeah, Reda Alhajj, Jon G. Rokne, Ken Barker:
Text summarization techniques: SVM versus neural networks. iiWAS 2009: 487-491 - 2008
- [j18]Adepele Williams, Ken Barker:
Controlling Inference: Avoiding P-level Reduction During Analysis. J. Res. Pract. Inf. Technol. 40(3): 163-186 (2008) - [j17]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Replica Placement Strategies in Data Grid. J. Grid Comput. 6(1): 103-123 (2008) - [j16]Rashedur M. Rahman, Reda Alhajj, Ken Barker:
Replica selection strategies in data grid. J. Parallel Distributed Comput. 68(12): 1561-1574 (2008) - [c76]Angela Cristina Duta, Ken Barker:
P4A: A New Privacy Model for XML. DBSec 2008: 65-80 - [c75]Nelson C. N. Chu, Quang Trinh, Ken Barker, Reda Alhajj:
A Dynamic Ontology Mapping Architecture for a Grid Database System. SKG 2008: 343-346 - [c74]Nelson C. N. Chu, Ken Barker:
Grid Scheduling Hub. SKG 2008: 511-512 - [p1]Muhaimenul, Reda Alhajj, Ken Barker:
Alternative Method for Incrementally Constructing the FP-Tree. Intelligent Techniques and Tools for Novel System Architectures 2008: 361-377 - 2007
- [j15]Tansel Özyer, Reda Alhajj, Ken Barker:
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. J. Netw. Comput. Appl. 30(1): 99-113 (2007) - [c73]Adepele Williams, Ken Barker:
Controlling Inference: Avoiding P-level Reduction during Analysis. ACSW 2007: 193-200 - [c72]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
A Predictive Technique for Replica Selection in Grid Environment. CCGRID 2007: 163-170 - [c71]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Study of Different Replica Placement and Maintenance Strategies in Data Grid. CCGRID 2007: 171-178 - [c70]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Performance Analysis of a Replica Selection Strategy in Grid Environment Tuned with Replica Placement Decisions. GCA 2007: 159-165 - [c69]Adesola Omotayo, Moustafa A. Hammad, Ken Barker:
A Cost Model for Storing and Retrieving Data in Wireless Sensor Networks. ICDE Workshops 2007: 29-38 - [c68]Angela Cristina Duta, Ken Barker, Reda Alhajj:
XML schema structural equivalence. ICEIS (1) 2007: 52-59 - [c67]Wendy Osborn, Ken Barker:
An insertion strategy for a two-dimensional spatial access method. ICEIS (1) 2007: 295-300 - [c66]Quang Trinh, Ken Barker, Reda Alhajj:
Semantic Interoperability Between Relational Database Systems. IDEAS 2007: 208-215 - [e1]Bipin C. Desai, Ken Barker:
Eleventh International Database Engineering and Applications Symposium (IDEAS 2007), September 6-8, 2007, Banff, Alberta, Canada. IEEE Computer Society 2007, ISBN 0-7695-2947-X [contents] - 2006
- [j14]Emin Erkan Korkmaz, Jun Du, Reda Alhajj, Ken Barker:
Combining advantages of new chromosome representation scheme and multi-objective genetic algorithms for better clustering. Intell. Data Anal. 10(2): 163-182 (2006) - [j13]Malik Agyemang, Ken Barker, Reda Alhajj:
A comprehensive survey of numeric and symbolic outlier mining techniques. Intell. Data Anal. 10(6): 521-538 (2006) - [j12]Jun Du, Reda Alhajj, Ken Barker:
Genetic algorithms based approach to database vertical partition. J. Intell. Inf. Syst. 26(2): 167-183 (2006) - [j11]Anthony Chiu Wa Lo, Reda Alhajj, Ken Barker:
VIREX: visual relational to XML conversion tool. J. Vis. Lang. Comput. 17(1): 25-45 (2006) - [j10]Sergio Camorlinga, Ken Barker:
A complex adaptive system based on squirrels behaviors for distributed resource allocation. Web Intell. Agent Syst. 4(1): 1-23 (2006) - [c65]Angela Cristina Duta, Ken Barker, Reda Alhajj:
RA: An XML Schema Reduction Algorithm. ADBIS Research Communications 2006 - [c64]Quang Trinh, Ken Barker, Reda Alhajj:
RDB2ONT: A Tool for Generating OWL Ontologies From Relational Database Systems. AICT/ICIW 2006: 170 - [c63]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Replica Placement Design with Static Optimality and Dynamic Maintainability. CCGRID 2006: 434-437 - [c62]Janaki Gopalan, Reda Alhajj, Ken Barker:
Discovering Accurate and Interesting Classification Rules Using Genetic Algorithm. DMIN 2006: 389-395 - [c61]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Effective Dynamic Replica Maintenance Algorithm for the Grid Environment. GPC 2006: 336-345 - [c60]Tansel Özyer, Reda Alhajj, Ken Barker:
Clustering by Integrating Multi-objective Optimization with Weighted K-Means and Validity Analysis. IDEAL 2006: 454-463 - [c59]Muhaimenul Adnan, Reda Alhajj, Ken Barker:
Constructing Complete FP-Tree for Incremental Mining of Frequent Patterns in Dynamic Databases. IEA/AIE 2006: 363-372 - [c58]Wendy Osborn, Ken Barker:
Searching through spatial relationships using the 2DR-tree. IMSA 2006: 71-76 - [c57]Emin Erkan Korkmaz, Reda Alhajj, Ken Barker:
Effective Clustering of High-Dimensional Data. ICDM (Posters) 2006: 91-100 - [c56]Adesola Omotayo, Moustafa A. Hammad, Ken Barker:
Update-Aware Scheduling Algorithms for Hierarchical Data Dissemination Systems. MDM 2006: 18 - [c55]Adesola Omotayo, Moustafa A. Hammad, Ken Barker:
Efficient Data Harvesting for Tracing Phenomena in Sensor Networks. SSDBM 2006: 59-70 - [c54]Anthony Chiu Wa Lo, Reda Alhajj, Ken Barker:
VIREX: Interactive Approach for Database Querying and Integration by Re-engineering Relational Data into XML. Web Intelligence 2006: 1079-1080 - 2005
- [j9]Osman Abul, Reda Alhajj, Faruk Polat, Ken Barker:
Finding differentially expressed genes for pattern generation. Bioinform. 21(4): 445-450 (2005) - [j8]Malik Agyemang, Ken Barker, Reda Alhajj:
Web outlier mining: Discovering outliers from web datasets. Intell. Data Anal. 9(5): 473-486 (2005) - [j7]Yimin Liu, Tansel Özyer, Reda Alhajj, Ken Barker:
Integrating Multi-Objective Genetic Algorithm and Validity Analysis for Locating and Ranking Alternative Clustering. Informatica (Slovenia) 29(1): 33-40 (2005) - [c53]George Shi, Ken Barker, Reda Alhajj:
Cognitive information fusion of georeferenced data for tactical applications. IEEE ICCI 2005: 160-166 - [c52]Sergio Camorlinga, Ken Barker:
The Biologically Inspired Distributed File System: An Emergent Thinker Instantiation. Self-star Properties in Complex Information Systems 2005: 81-96 - [c51]Malik Agyemang, Ken Barker, Reda Alhajj:
Hybrid Approach to Web Content Outlier Mining Without Query Vector. DaWaK 2005: 285-294 - [c50]Tansel Özyer, Reda Alhajj, Ken Barker:
Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 13-22 - [c49]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Replica Placement in Data Grid: A Multi-objective Approach. GCC 2005: 645-656 - [c48]Chunyan Wang, Anthony Chiu Wa Lo, Reda Alhajj, Ken Barker:
Novel Approach for Reengineering Relational Databases into XML. ICDE Workshops 2005: 1284 - [c47]Janaki Gopalan, Emin Erkan Korkmaz, Reda Alhajj, Ken Barker:
Effective data mining by integrating genetic algorithm into the data preprocessing phase. ICMLA 2005 - [c46]Malik Agyemang, Ken Barker, Reda Alhajj:
WCOND-Mine: Algorithm for Detecting Web Content Outliers from Web Documents. ISCC 2005: 885-890 - [c45]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Replica Placement in Data Grid: Considering Utility and Risk. ITCC (1) 2005: 354-359 - [c44]Jun Du, Emin Erkan Korkmaz, Reda Alhajj, Ken Barker:
Alternative Clustering by Utilizing Multi-objective Genetic Algorithm with Linked-List Based Chromosome Encoding. MLDM 2005: 346-355 - [c43]Ajumobi Udechukwu, Ken Barker, Reda Alhajj:
Maintaining Knowledge-Bases of Navigational Patterns from Streams of Navigational Sequences. RIDE 2005: 37-44 - [c42]Malik Agyemang, Ken Barker, Reda Alhajj:
Mining web content outliers using structure oriented weighting techniques and N-grams. SAC 2005: 482-487 - [c41]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Replica selection in grid environment: a data-mining approach. SAC 2005: 695-700 - [c40]John Aycock, Ken Barker:
Viruses 101. SIGCSE 2005: 152-156 - 2004
- [j6]Ajumobi Udechukwu, Ken Barker, Reda Alhajj:
A framework for representing navigational patterns as full temporal objects. SIGecom Exch. 5(2): 23-33 (2004) - [c39]Tansel Özyer, Yimin Liu, Reda Alhajj, Ken Barker:
Multi-objective Genetic Algorithm Based Clustering Approach and Its Application to Gene Expression Data. ADVIS 2004: 451-461 - [c38]Jun Du, Emin Erkan Korkmaz, Reda Alhajj, Ken Barker:
Novel Clustering That Employs Genetic Algorithm with New Representation Scheme and Multiple Objectives. DaWaK 2004: 219-228 - [c37]Anthony Chiu Wa Lo, Reda Alhajj, Ken Barker:
Flexible User Interface for Converting Relational Data into XML. FQAS 2004: 418-431 - [c36]Ajumobi Udechukwu, Ken Barker, Reda Alhajj:
An Efficient Framework for Iterative Time-Series Trend Mining. ICEIS (2) 2004: 130-137 - [c35]Angela Cristina Duta, Ken Barker, Reda Alhajj:
Conv2XML: Relational Schema Conversion to XML Nested-Based Schema. ICEIS (1) 2004: 210-215 - [c34]Chunyan Wang, Anthony Chiu Wa Lo, Reda Alhajj, Ken Barker:
Converting Legacy Relational Database into XML Database through Reverse Engineering. ICEIS (1) 2004: 216-221 - [c33]Tansel Özyer, Reda Alhajj, Ken Barker:
Multi-dimensional sequential web mining by utilizing fuzzy interferencing. ICMLA 2004: 34-40 - [c32]Yuliang Bao, Reda Alhajj, Ken Barker:
Hybrid Cache Invalidation Schemes in Mobile Environments. ICPS 2004: 209-218 - [c31]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Predicting the Performance of GridFTP Transfers. IPDPS 2004 - [c30]Nelson C. N. Chu, Adepele Williams, Reda Alhajj, Ken Barker:
Data Stream Mining Architecture for Network Intrusion Detection. IRI 2004: 363-368 - [c29]Ajumobi Udechukwu, Ken Barker, Reda Alhajj:
Mining User Navigational Patterns in Dynamically Changing Environments. ITCC (2) 2004: 372- - [c28]Tansel Özyer, Reda Alhajj, Ken Barker:
Utilizing Rough Sets and Multi-objective Genetic Algorithms for Automated Clustering. Rough Sets and Current Trends in Computing 2004: 567-572 - [c27]